IT Risk Assessments and the SANS Top 20
by Geoff Yeagley on January 26, 2016 at 10:14 AM
No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.
Social Engineering - What You Need to Know
by Geoff Yeagley on January 19, 2016 at 11:04 AM
For those of us in the Information Security world, we hear terms thrown around all the time that are often interchanged, confused, and sometimes misused. One of those terms is Social Engineering. On the surface, this is a confusing term that doesn't appear to have anything to do with …
Social Engineering - Mitigating Your Risk
by Geoff Yeagley on January 12, 2016 at 11:41 AM
As we look into 2016 and what trends are going to take place this year in the world of Information Security, there is one thing that we can predict with significant confidence: Employees will remain the biggest threat to your Information Security Program and ultimately the safety of t …
IT Security in 2016: What Comes Next?
by Geoff Yeagley on January 5, 2016 at 10:00 AM
The last several years in IT Security have been full of surprises as well as the fulfillment of predictions that have been made. If you recall back to 2014, the famed credit card breaches that took place were predicted by most and ultimately held true to form. We had a rash of major b …
The HIPAA Risk Assessment: The First Step in a Long Journey
by Geoff Yeagley on December 11, 2015 at 10:20 AM
Every year, experts make predictions on what the following year is going to hold in terms of trends in the cybersecurity industry, what new threats we might face, and what impacts those threats might have on the average person. For years we heard about credit card security and the ass …
FFIEC Guidance: Revision vs. Update
by Geoff Yeagley on December 8, 2015 at 10:00 AM
When it comes to technology, we hear of terms that are often times confused and interchanged. Some examples of these terms might include Vulnerability Scanning and Penetration Testing. Another example might be the age old debate of Risk Assessment versus Audit. While seemingly similar …